期刊文献+

制造网格中访问控制的研究 被引量:8

Access control of manufacturing grid
在线阅读 下载PDF
导出
摘要 针对制造网格开放的系统框架、动态的组织结构和复杂的业务流程等特性,提出了一种基于网格社区授权服务框架的动态、分粒度访问控制解决方案。在该方案中,制造网格的访问控制模型扩展了基于角色的访问控制模型。全局细粒度的访问控制策略确定用户对应角色的全局权限;根据项目状态,动态调整角色的可执行权限,本地粗粒度的访问控制策略确定服务的共享权限;服务节点做出授权决策。应用实例证明,制造网格访问控制模型支持动态授权及制造网格服务节点自主控制,可以增强制造网格的安全性。 Based on the Community Authorization Service (CAS) architecture, an access control solution was proposed to satisfy the inherent natures of the Manufacturing Grid (MG), such as open architecture, dynamic organization and complicated business processes. In this solution, the Manufacturing Grid Access Control (MGAC) model extended the Role-based Access Control (RBAC) model. In the MGAC model, global fine-grained policies were used to authorize users' global privileges. Enabled privileges could be adjusted according to the current project state. The local coarse-grained access control policies were used to define the privileges of the shared services. The authorization decision was made by a local service node based on the local access control polices and the global privileges of users. The implementation in Shanghai High Institutions Grid proved that the access control model could support the dynamic authorization and local management and improve the security of MG.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2007年第4期716-720,共5页 Computer Integrated Manufacturing Systems
基金 上海市教委E研究院--上海高校网格资助项目(200302)~~
关键词 制造网格 社区授权服务 基于角色的访问控制 安全 manufacturing grid community authorization service role-based access control security
  • 相关文献

参考文献8

  • 1刘丽兰,俞涛,施战备,方明伦.自组织制造网格及其任务调度算法[J].计算机集成制造系统-CIMS,2003,9(6):449-455. 被引量:47
  • 2陈凤珍,洪帆.基于任务的访问控制(TBAC)模型[J].小型微型计算机系统,2003,24(3):621-624. 被引量:25
  • 3刘宏月,范九伦,马建峰.访问控制技术研究进展[J].小型微型计算机系统,2004,25(1):56-59. 被引量:77
  • 4FERRAIOLO D F,SANDHU R,GAVRILA D,et al.A proposed standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4 (3):224-274.
  • 5WELCH V,SIEBENLIST F.GT3 grid security infrastructure overview[EB/OL].(2003-01-04).http://www-unix.globus.org/ogsa/docs/alpha/GT3SecurityOverview.pdf.
  • 6PEARLMAN L,KESSELMAN C,WELCH V,et al.The community authorization service:status and future[R].La Jolla,Cal.,USA:CHEP03,2003.
  • 7LI Xiaolin,XU Zhiwei,LIU Xingwu,et al.Community-based model and access control for information grid[C]//Proceedings of the IEEE/WIC International Conference on Web Intelligence.Piscataway,N.J.,USA:IEEE Press,2003:462-465.
  • 8许峰,赖海光,黄皓,谢立.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693. 被引量:56

二级参考文献16

  • 1Gladney H.M., Meyers J.J., Worley E.L. Access control mechanism for computing resources. IBM Systems Journal, 1975, 14(3): 212~228
  • 2Anderson J.P. Computer security technology planning study. Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA: Technical Report ESDTR-73-51, 1972
  • 3Xu Feng, Xie Jun, Huang Hao, Xie Li. Context-aware role-based access control model for Web services. Lecture Notes in Computer Science 3252, 2004, 430~436
  • 4Ferraiolo David, Kuhn Richard. Role-based access controls. In: Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, 1992, 554~563
  • 5Sandhu R., Conyne E.J., Lfeinstein H.L. et al. Role based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 6Ferraiolo D.F., Sandhu R., Guirila S., Kuhn D.R., Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001, 4(3): 224~274
  • 7Xu Feng, Lin Guo-Yuan, Huang Hao, Xie Li. Role-based access control system for Web services. In: Proceedings of the 4th International Conference on Computer and Information Technology (CIT'04), Wuhan, 2004, 357~362
  • 8Thomas R.K., Sandhu R. Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, London, 1997, 166~181
  • 9Sudhir Agarwal, Barbara Sprick. Access control for semantic Web services. In: Proceedings of IEEE International Conference on Web Services (ICWS'04), San Diego, California,USA, 2004, 770~773
  • 10Bhatti R., Joshi J.B.D., Bertino E., Ghafoor A. Access control in dynamic XML-based Web-services with XRBAC. In: Proceedings of the 1st International Conference on Web Services, Las Vegas, 2003, 243~249

共引文献198

同被引文献68

引证文献8

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部